We just raised a $30M Series A: Read our story

Blackberry Protect Valuable Features

OT Cyber Security Principal Consultant at Jacobs Engineering Group Inc.

The non-daily requirement to update signatures is the most valuable feature. From a functional point of view, it is pretty spot on. For instance, we compared an algorithm from five years ago to today's algorithm, and it was 98% accurate. It has the ability to detect and mitigate.

In the industrial environment that we work in, there's what we call OT versus IT. You are IT Central, but this is OT. Generally, we don't have the same level of skillset as IT individuals or IT professionals have. This particular product doesn't require you to be a computer scientist to be able to understand its proprietary algorithm and to be able to deploy, use, and work within it. It integrates well with a robust SIEM or SOAR solution, and it plays nice with others. We use other detection solutions like CyberX or site provision with Cisco, and it plays nice. That's one of the things we really liked about it.

View full review »
DV
Senior Network Administrator at a financial services firm with 51-200 employees

The deployment of updates is easy.

View full review »
IT Security manager at a energy/utilities company with 201-500 employees

The most functional item that we use is the process to turn off the false flags that it causes.

View full review »
Learn what your peers think about Blackberry Protect. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
554,382 professionals have used our research since 2012.
Owner at Terra Controls

The most valuable feature is the AI and ML-based virus protection that does not rely on signature-based detection methods. The way this product works is that it does not go to a central server to pick up the latest virus definitions. Instead, it's a processor-powered search that checks to see if anything out of the ordinary is running on your machine. It looks for anomalies and cancels processes that do not look normal. For example, if a program tries to read the registry and then make a change, but it hasn't been authorized, then it is assumed to be a bad actor and the process is canceled or the action is disallowed.

View full review »
AB
Vice President Operations at a construction company with 11-50 employees

I think Cylance has just done a great job for us so far. I think that is the headliner for our experience with the product. The computer interface really has next to nothing on it, which is nice. You see what you need to see and there are really no distractions or extra noise.  

We have not had anything major come up that the product has not handled — at least not that we have known of. There have been a total of zero issues.  

View full review »
Head of Cloud Services and Projects at Grove Group

The protection, specifically for endpoint protection, has been the most valuable. With Cylance AI and Machine Learning, it's ensuring that all types of malware, PUP (Potential Unwanted Programs) and Memory Protection your endpoint devices are fully protected, even with day zero threats. Cylance also got the optics add-on for advance scanning and reporting, but most of the clients are more interested in the protection as this is all you need for your endpoint security.

View full review »
Head of Systems at SKN Caribecafe Ltda

The solution is very quick at easily changing the levels of protection for each computer and the server. It's very easy to control and to see what is happening with each computer. It's very easy to choose, which computer I can look at and check. 

View full review »
MH
Vice President Product and Strategy at a tech company with 201-500 employees

The product works pretty well. It does a good job catching good viruses. While we haven't had a chance to test against any kind of ransomware attack, I know it works great and I'm not worried about its capabilities in that respect.

The initial setup was straightforward. 

The solution has proven itself to be very stable and unobtrusive.

A user can continue to add endpoints and the solution will continue to perform well.  

Technical support is helpful and responsive. 

View full review »
RC
President at a security firm with 11-50 employees

In most cases, the solution's ability to detect in the MITRE framework and its ability to be able to detect attacks in any one of seven or eight different areas of the life cycle of an attack is very useful.

View full review »
LS
IT Infrastructure Manager at a financial services firm with 51-200 employees

This is still new to us. We have explored this solution and it fulfills our requirements, in terms of live malware detection.

We are quite security-focused. Blackberry Protect as an endpoint solution for our service really delivers what we are expecting.

View full review »
BK
Security Domain Architect at a tech services company with 5,001-10,000 employees

What is valuable to me is the protection the solution provides against unauthorized applications. It secures different entry points into the network so that instead of being outside the internet, it's actually in the network and helps to protect internally.

View full review »
SJ
Head of IT Operations at a manufacturing company with 1,001-5,000 employees

Cylance is quite lightweight and does not require constant updates.

The Application Guard and ByteGuard are useful features.

View full review »
HP
VP at a tech services company with 11-50 employees

The most valuable features are script blocking and macros within Word documents for stopping unwanted applications from running in the background.

The dashboard is good.

There is not too much overhead, which is good because you don't want unnecessary things that just build in bulk. 

View full review »
BlackBerry Cylance SME - Resident Engineer at a tech services company with 201-500 employees

I like the AI and mathematical components that they use.

I like the pre-execution method of protection that prevents infection. It is a nice feature.

View full review »
MP
Technology Specialist at a tech vendor with 11-50 employees

The most valuable features of this solution are that it's:

  • Easy to use
  • Minimalist 
  • Has good RAM capacity for the power I need.
  • Isn't bulky.
View full review »
KO
Senior NOC Security Engineer at a wholesaler/distributor with 51-200 employees

I find the actual overall endpoint malware protection the most valuable feature of CylancePROTECT.

View full review »
SD
Coordinator of special projects at a manufacturing company with 201-500 employees

The solution does a good job of blocking whatever it thinks needs to be blocked and it doesn't require a lot of performance from the computer.

View full review »
Learn what your peers think about Blackberry Protect. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
554,382 professionals have used our research since 2012.